Words to know

The world of IoT connectivity is filled with technical terms and industry jargon—but understanding them shouldn't be a challenge. We believe in making things simple and clear, so this glossary is here to help. 

Understanding IoT connectivity, global SIMs, and telecom infrastructure can be challenging, especially when selecting providers or managing deployments across multiple regions.

 

This glossary defines essential terms in cellular IoT, eSIM, iSIM, APNs, and data pooling. Whether you are a CTO, connectivity engineer, or product leader, rely on this guide to make informed and efficient decisions for secure, scalable IoT deployment.

5G

5G is the next evolution in mobile network technology, delivering faster data speeds, lower latency, and increased capacity compared to previous generations. Designed to support a growing number of connected devices, 5G enables seamless communication for IoT solutions, smart cities, and advanced business operations. With ultra-reliable, high-speed connectivity, businesses can leverage 5G to enhance productivity, improve automation, and enable real-time applications like remote monitoring, augmented reality (AR), and autonomous systems. This technology offers the infrastructure needed for digital transformation across industries, empowering companies to innovate, optimize processes, and stay competitive in an increasingly connected world. 5G operates across low, mid, and high-frequency spectrum bands, offering unique advantages for different use cases, such as coverage, speed, and ultra-low latency.

 

APN (Access Point Name)
An APN is a separate network within the mobile network, where connected devices are granted access to the internet. When you use mobile data, your device connects to an APN and is granted internet access. Most carriers provide one or more APNs to deliver data -services.
BIP (Bearer Independent Protocol)
BIP enables a SIM card to communicate directly with the network, independently of the device it’s in. This allows essential services like mobile payments or remote updates to run smoothly, even if the device isn’t actively using its main internet connection. BIP ensures seamless and reliable connectivity for critical IoT applications.
Core Network

The Core Network consists of multiple systems that facilitates different telecommunication services. It manages subscribers, voice, data, and messaging services. It connects users to the internet, mobile, or landline networks, while handling tasks like authenticating users, routing calls, and ensuring security. Think of it as the “brain” of the telecom network, ensuring smooth and reliable communication.

 

IXT is a full MVNO with our own core network.

Data Pool

A data pool is a shared collection of data that multiple devices within your organisation can access. Think of it like a family plan for data, where all your active SIMs can pull from the same source, but with much more flexibility and control. Instead of individual data limits for each SIM, they all share one large pool of data. 

 

Read more about the IXT Global Data Pool. 

eSIM

What is eSIM?

 

An eSIM consists of a small chip (eUICC) soldered directly onto a device's circuit board during manufacturing, eliminating the need for physical SIM cards. For IoT deployments, eSIMs enable remote SIM provisioning and carrier switching without physical access to devices, significantly reducing operational costs and deployment time. This technology is particularly valuable for global IoT deployments, allowing businesses to manage their entire device fleet through a single platform while maintaining local connectivity options worldwide.

 

Order your IXT Global SIM here.

 

You can also read more about eSIM here.

IMEI
IMEI is a 15-digit unique identifier assigned to every mobile device that allows networks to identify valid devices. It identifies a device manufacturer, device model, and device. The format consists of: TAC (Type Allocation Code: 7 digits) + Serial Number (6 digits) + Checksum (1 digit). The TAC is used to identify the manufacturer and the device model.
IMSI
IMSI is a globally unique identifier stored on a SIM card that identifies both the subscriber and their mobile operator. The IMSI is usually not transmitted in clear, but as a temporary number called TMSI. The format consists of: MCC (Mobile Country Code: 3 digits) + MNC (Mobile Network Code: 2-3 digits) + MSIN (Mobile Subscriber Identification Number: 9-10 digits).
iSIM
iSIM represents the next evolution in SIM technology, integrating SIM functionality directly into a device's main processor or cellular modem. For IoT deployments, iSIM offers enhanced security through hardware-level integration while reducing device size, power consumption, and manufacturing costs. This makes it especially suitable for mass-scale IoT deployments where device miniaturisation and cost efficiency are crucial.
LoRaWAN
LoRaWAN is a Low-Power Wide-Area Network (LPWAN) protocol designed for IoT applications that require long-range, energy-efficient connectivity. It enables businesses to deploy battery-powered sensors and devices that can operate for years without maintenance. The protocol's long-range capabilities allow for efficient coverage of large industrial sites, agricultural operations, or city-wide deployments with minimal infrastructure investment, making it cost-effective for large-scale IoT networks.
LPWAN
LPWAN is a wireless network type optimised for IoT deployments that need to communicate over long distances using minimal power. LPWAN technologies enable cost-effective deployment of large-scale sensor networks, asset tracking systems, and remote monitoring solutions. These networks are particularly valuable for businesses managing distributed assets across large geographical areas while maintaining low operational costs, for example applications such as environmental monitoring, asset tracking, and smart metering, where energy efficiency is crucial.
LTE

LTE, commonly referred to as 4G, is a high-speed mobile network technology that delivers faster data speeds and lower latency than its predecessors. In IoT, LTE supports bandwidth-intensive applications like video surveillance, industrial automation, and remote equipment monitoring. Its widespread availability makes it ideal for IoT solutions requiring reliable, high-speed connectivity across urban and suburban areas.

LTE Cat 1
LTE Cat 1 is a low-power variant of LTE optimised for IoT devices. It balances moderate data rates with energy efficiency, making it ideal for applications like connected wearables, point-of-sale terminals, fleet management, and industrial automation.
LTE-M
LTE-M is a low-power LTE technology specifically designed for IoT devices. It supports extended coverage (including deep indoor coverage) and efficient power usage, making it ideal for enterprise IoT deployments needing reliable connectivity in challenging environments like basements or remote locations. The technology's power efficiency and enhanced coverage characteristics make it particularly valuable for utility metering, asset tracking, and industrial monitoring applications where devices need to operate for years on a single battery.
M2M
Machine-to-Machine (M2M) refers to technology that enables devices to communicate directly with each other. M2M is a broader term than the Internet of Things (IoT), as it simply covers the exchange of data between machines, regardless of the type of network or devices involved. This can happen over various networks such as Ethernet, Wi-Fi, cellular or satellite. It’s used in industries like manufacturing, logistics, and healthcare to automate processes, improve efficiency, and gather real-time data from connected machines.
Permanent Roaming
Permanent Roaming is when a device continuously uses a network outside its home region. If a device is roaming in a network outside its 'home' region for an extended period it may be considered a permanent roamer. If your carrier does not have the proper roaming agreements this could lead to your devices being kicked off the network. It is also important to note that some countries enforce strict policies that forbids permanent roaming.
Private APN

Think of a private APN like a closed network, where connected devices can communicate securely. Access to external systems/servers is limited and only allowed if configured.

For IoT deployments, private APNs enable businesses to isolate their device traffic from public networks, implement custom security policies, and maintain direct control over data routing. This infrastructure is particularly crucial for sensitive applications like industrial automation, healthcare monitoring, or financial services where data security and network reliability are paramount.

SASE

SASE combines network and security functions into a cloud-based service that enables secure connectivity for IoT devices regardless of their location. In B2B IoT deployments, SASE provides unified security policies, threat protection, and network optimisation across your entire device fleet, ensuring consistent security standards whether devices are connecting through cellular networks, Wi-Fi, or other connectivity options. This architecture is particularly valuable for businesses managing large-scale IoT deployments where devices need secure access to cloud services and enterprise applications from various locations and network types.

 

Read more about IXT Security services here.

SGP.32

SASE combines network and security functions into a cloud-based service that enables secure connectivity for IoT devices regardless of their location. In B2B IoT deployments, SASE provides unified security policies, threat protection, and network optimisation across your entire device fleet, ensuring consistent security standards whether devices are connecting through cellular networks, Wi-Fi, or other connectivity options. This architecture is particularly valuable for businesses managing large-scale IoT deployments where devices need secure access to cloud services and enterprise applications from various locations and network types.

 

Read more about SGP.32 here.

SIM

SIM (Subscriber Identification Module) is a small removable chip that stores key information like the International Mobile Subscriber Identity (IMSI) and encryption keys, enabling devices to connect to cellular networks. There are five main form factors for physical SIM cards: Full-Size (FF1), Mini-SIM (FF2), Micro-SIM (FF3), Nano-SIM (FF4), and Embedded SIM (MFF2). Over time, SIM cards have become smaller, offering hardware advantages like more space for other components. Each SIM type can operate with different software: ICC, UICC, or eUICC.

 

Read more about IXT SIM here.

UICC

A UICC (Universal Integrated Circuit Card) is a multi-application smart card platform featuring an integrated circuit with processing capabilities, multiple memory types (NVRAM, ROM, RAM), and standardised security architecture that enables interoperability across 3G, 4G, and LTE networks. It serves as the foundational hardware for various subscriber identity modules (USIM, CSIM, ISIM), allowing secure authentication and global network compatibility through a unique identifier while providing scalable storage capacity from 256KB to over 1GB for both network authentication data and user applications.

 

Read more about IXT SIM here.

RSP

RSP is an umbrella term for various GSMA standards for remote SIM provisioning:

M2M: SGP.02

Consumer: SGP.22

IoT: SGP.32

RSP technology makes it possible to swap operator/subscription without replacing the physical SIM card.

 

Read more about IXT SIM here.

VPN

What is a VPN?

 

A Virtual Private Network (VPN) creates an encrypted tunnel for IoT devices to securely communicate with enterprise networks and cloud platforms across public internet connections. In IoT deployments, VPNs provide an additional layer of security by encrypting device data transmission, preventing unauthorised access, and ensuring sensitive information remains protected as it travels between devices and your core systems. This technology is particularly important for IoT applications handling sensitive data or requiring secure remote management capabilities, such as industrial control systems, healthcare devices, or financial transaction terminals.

 

Read more about IXT SecureNet here.